首页 > 最新文献

Applicable Algebra in Engineering Communication and Computing最新文献

英文 中文
Correction: Determination for minimum symbol-pair and RT weights via torsional degrees of repeated-root cyclic codes 更正:通过重复根循环码的扭转度确定最小符号对和 RT 权重
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-17 DOI: 10.1007/s00200-023-00609-3
Boran Kim
{"title":"Correction: Determination for minimum symbol-pair and RT weights via torsional degrees of repeated-root cyclic codes","authors":"Boran Kim","doi":"10.1007/s00200-023-00609-3","DOIUrl":"10.1007/s00200-023-00609-3","url":null,"abstract":"","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"35 4","pages":"589 - 589"},"PeriodicalIF":0.6,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135861225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The paint pot problem and common multiples in monoids 油漆罐问题和一元群的公倍数
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-13 DOI: 10.1007/s00200-023-00606-6
Hans Zantema, Vincent van Oostrom

Illustrated by a problem on paint pots that is easy to understand but hard to solve, we investigate whether particular monoids have the property of common right multiples. As one result we characterize generalized braid monoids represented by undirected graphs, being a subclass of Artin–Tits monoids. Stated in other words, we investigate to which graphs the old Garside result stating that braid monoids have the property of common right multiples, generalizes. This characterization also follows from old results on Coxeter groups and the connection between finiteness of Coxeter groups and common right multiples in Artin–Tits monoids. However, our independent presentation is self-contained up to some basic knowledge of rewriting, and also applies to monoids beyond the Artin–Tits format. The main new contribution is a technique to prove that the property of common right multiples does not hold, by finding a particular model, in our examples all being finite.

以一个容易理解但难于解决的油漆罐问题为例,研究了特定模群是否具有公右倍数的性质。作为一个结果,我们刻画了由无向图表示的广义辫形monoids,它是Artin-Tits monoids的一个子类。换句话说,我们研究了关于辫形模群具有公右倍数性质的旧Garside结果推广到哪些图上。这一性质也来自于关于Coxeter群的旧结果以及Artin-Tits一元群中Coxeter群的有限性与公右倍数之间的联系。然而,我们的独立表示是自包含的,直到一些重写的基本知识,也适用于超越art - tits格式的monoids。主要的新贡献是一种技术来证明公右乘的性质不成立,通过找到一个特定的模型,在我们的例子都是有限的。
{"title":"The paint pot problem and common multiples in monoids","authors":"Hans Zantema,&nbsp;Vincent van Oostrom","doi":"10.1007/s00200-023-00606-6","DOIUrl":"10.1007/s00200-023-00606-6","url":null,"abstract":"<div><p>Illustrated by a problem on paint pots that is easy to understand but hard to solve, we investigate whether particular monoids have the property of common right multiples. As one result we characterize generalized braid monoids represented by undirected graphs, being a subclass of Artin–Tits monoids. Stated in other words, we investigate to which graphs the old Garside result stating that braid monoids have the property of common right multiples, generalizes. This characterization also follows from old results on Coxeter groups and the connection between finiteness of Coxeter groups and common right multiples in Artin–Tits monoids. However, our independent presentation is self-contained up to some basic knowledge of rewriting, and also applies to monoids beyond the Artin–Tits format. The main new contribution is a technique to prove that the property of common right multiples does not hold, by finding a particular model, in our examples all being finite.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 2","pages":"341 - 363"},"PeriodicalIF":0.6,"publicationDate":"2023-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-023-00606-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48208169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
More classes of optimal quinary cyclic codes of form ({mathcal {C}}_{(1,e,s)}) 更多类形式为$${mathcal{C}}_{(1,e,s)}的最优五元循环码$$
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-13 DOI: 10.1007/s00200-023-00604-8
Yan Liu, Xiwang Cao, Zhengbang Zha

Cyclic codes are an important subclass of linear codes. In this paper, we investigate the construction of quinary cyclic codes with parameters ([5^{m}-1, 5^{m}-2m-2, 4]) and eight new classes optimal quinary cyclic codes of form ({mathcal {C}}_{(1,e,s)}) are presented by discussing the solutions of certain equations over ({mathbb {F}}_{5^{m}}).

循环码是线性码的一个重要子类。本文研究了参数为([5^{m}-1, 5^{m}-2m-2, 4])的五元循环码的构造,并通过讨论({mathbb {F}}_{5^{m}})上若干方程的解,得到了形式为({mathcal {C}}_{(1,e,s)})的八类新的最优五元循环码。
{"title":"More classes of optimal quinary cyclic codes of form ({mathcal {C}}_{(1,e,s)})","authors":"Yan Liu,&nbsp;Xiwang Cao,&nbsp;Zhengbang Zha","doi":"10.1007/s00200-023-00604-8","DOIUrl":"10.1007/s00200-023-00604-8","url":null,"abstract":"<div><p>Cyclic codes are an important subclass of linear codes. In this paper, we investigate the construction of quinary cyclic codes with parameters <span>([5^{m}-1, 5^{m}-2m-2, 4])</span> and eight new classes optimal quinary cyclic codes of form <span>({mathcal {C}}_{(1,e,s)})</span> are presented by discussing the solutions of certain equations over <span>({mathbb {F}}_{5^{m}})</span>.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 2","pages":"327 - 339"},"PeriodicalIF":0.6,"publicationDate":"2023-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45582324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A discrete SIS-model built on the strictly positive scheme 基于严格正格式的离散SIS模型
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-09 DOI: 10.1007/s00200-023-00607-5
Marcin Choiński

In this paper we introduce and analyze a discrete SIS epidemic model for a homogeneous population. As a discretization method the strictly positive scheme was chosen. The presented model is built from its continuous counterpart known from literature. We firstly present basic properties of the system. Later we discuss local stability of stationary states and global stability for the disease-free stationary state. The results for this state are expressed with the use of the basic reproduction number. The main conclusion from our work is that conditions for stability of the stationary states do not depend on the step size of the discretization method. This fact stays in contrary to other discrete models analyzed in our previous papers. Theoretical results are accomplished with numerical simulations.

在本文中,我们介绍并分析了一种针对同质人群的离散 SIS 流行病模型。作为离散化方法,我们选择了严格正方案。本文介绍的模型是根据文献中已知的连续模型建立的。我们首先介绍了该系统的基本特性。随后,我们讨论了静止状态的局部稳定性和无疾病静止状态的全局稳定性。这种状态的结果用基本繁殖数来表示。我们工作的主要结论是,静止状态的稳定条件并不取决于离散化方法的步长。这一事实与我们之前论文中分析的其他离散模型相反。我们通过数值模拟得出了理论结果。
{"title":"A discrete SIS-model built on the strictly positive scheme","authors":"Marcin Choiński","doi":"10.1007/s00200-023-00607-5","DOIUrl":"10.1007/s00200-023-00607-5","url":null,"abstract":"<div><p>In this paper we introduce and analyze a discrete <i>SIS</i> epidemic model for a homogeneous population. As a discretization method the strictly positive scheme was chosen. The presented model is built from its continuous counterpart known from literature. We firstly present basic properties of the system. Later we discuss local stability of stationary states and global stability for the disease-free stationary state. The results for this state are expressed with the use of the basic reproduction number. The main conclusion from our work is that conditions for stability of the stationary states do not depend on the step size of the discretization method. This fact stays in contrary to other discrete models analyzed in our previous papers. Theoretical results are accomplished with numerical simulations.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"35 2022","pages":"17 - 30"},"PeriodicalIF":0.6,"publicationDate":"2023-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-023-00607-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45166937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fourteen years of cube attacks 立方体攻击14年
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-04 DOI: 10.1007/s00200-023-00602-w
Marco Cianfriglia, Elia Onofri, Silvia Onofri, Marco Pedicini

Algebraic Cryptanalysis is a widely used technique that tackles the problem of breaking ciphers mainly relying on the ability to express a cryptosystem as a solvable polynomial system. Each output bit/word can be expressed as a polynomial equation in the cipher’s inputs—namely the key and the plaintext or the initialisation vector bits/words. A part of research in this area consists in finding suitable algebraic structures where polynomial systems can be effectively solved, e.g., by computing Gröbner bases. In 2009, Dinur and Shamir proposed the cube attack, a chosen plaintext algebraic cryptanalysis technique for the offline acquisition of an equivalent system by means of monomial reduction; interpolation on cubes in the space of variables enables retrieving a linear polynomial system, hence making it exploitable in the online phase to recover the secret key. Since its introduction, this attack has received both many criticisms and endorsements from the crypto community; this work aims at providing, under a unified notation, a complete state-of-the-art review of recent developments by categorising contributions in five classes. We conclude the work with an in-depth description of the kite attack framework, a cipher-independent tool that implements cube attacks on GPUs. Mickey2.0 is adopted as a showcase.

代数密码分析是一种广泛使用的技术,它主要依靠将密码系统表示为可解多项式系统的能力来解决密码破解问题。每个输出位/字都可以表示为密码输入中的多项式方程,即密钥和明文或初始化向量位/字。这一领域的一部分研究包括寻找合适的代数结构,其中多项式系统可以有效地求解,例如,通过计算Gröbner基。2009年,Dinur和Shamir提出了立方体攻击,这是一种选择的明文代数密码分析技术,用于通过单项约简离线获取等效系统;在变量空间的立方体上插值可以检索线性多项式系统,从而使其在在线阶段可以被利用来恢复密钥。自推出以来,这种攻击受到了加密社区的许多批评和支持;这项工作的目的是在统一的符号下,通过将贡献分为五类,对最近的发展进行全面的最新审查。我们通过深入描述风筝攻击框架来结束这项工作,风筝攻击框架是一种独立于密码的工具,可在gpu上实现立方体攻击。采用Mickey2.0作为展示。
{"title":"Fourteen years of cube attacks","authors":"Marco Cianfriglia,&nbsp;Elia Onofri,&nbsp;Silvia Onofri,&nbsp;Marco Pedicini","doi":"10.1007/s00200-023-00602-w","DOIUrl":"10.1007/s00200-023-00602-w","url":null,"abstract":"<div><p>Algebraic Cryptanalysis is a widely used technique that tackles the problem of breaking ciphers mainly relying on the ability to express a cryptosystem as a solvable polynomial system. Each output bit/word can be expressed as a polynomial equation in the cipher’s inputs—namely the key and the plaintext or the initialisation vector bits/words. A part of research in this area consists in finding suitable algebraic structures where polynomial systems can be effectively solved, e.g., by computing Gröbner bases. In 2009, Dinur and Shamir proposed the <i>cube attack</i>, a chosen plaintext algebraic cryptanalysis technique for the offline acquisition of an equivalent system by means of monomial reduction; interpolation on <i>cubes</i> in the space of variables enables retrieving a linear polynomial system, hence making it exploitable in the online phase to recover the secret key. Since its introduction, this attack has received both many criticisms and endorsements from the crypto community; this work aims at providing, under a unified notation, a complete state-of-the-art review of recent developments by categorising contributions in five classes. We conclude the work with an in-depth description of the <i>kite attack framework</i>, a cipher-independent tool that implements cube attacks on GPUs. Mickey2.0 is adopted as a showcase.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 2","pages":"285 - 325"},"PeriodicalIF":0.6,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-023-00602-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45636548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determination for minimum symbol-pair and RT weights via torsional degrees of repeated-root cyclic codes 通过重根循环码的扭转度确定最小符号对和RT权值
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-04-26 DOI: 10.1007/s00200-023-00605-7
Boran Kim

There are various metrics for researching error-correcting codes. Especially, high-density data storage system gives the existence of inconsistency for the reading and writing process. The symbol-pair metric is motivated for outputs that have overlapping pairs of symbols in a certain channel. The Rosenbloom–Tsfasman (RT) metric is introduced since there exists a problem that is related to transmission over several parallel communication channels with some channels not available for the transmission. In this paper, we determine the minimum symbol-pair weight and RT weight of repeated-root cyclic codes over (mathfrak R=mathbb {F}_{p^m}[u]/langle u^4rangle ) of length (n=p^k). For the determination, we explicitly present third torsional degree for all different types of cyclic codes over (mathfrak R) of length n.

纠错码的研究有多种指标。特别是在高密度数据存储系统中,读写过程存在不一致性。符号对度量是针对某一信道中存在重叠符号对的输出而提出的。引入 Rosenbloom-Tsfasman (RT) 度量是因为存在一个问题,即在多个并行通信信道上进行传输时,某些信道无法用于传输。本文确定了长度为 (n=p^k) 的 (mathfrak R=mathbb {F}_{p^m}[u]/langle u^4rangle ) 上重复根循环码的最小符号对权重和 RT 权重。为了确定这一点,我们明确提出了长度为 n 的 (mathfrak R) 上所有不同类型循环码的第三扭转度。
{"title":"Determination for minimum symbol-pair and RT weights via torsional degrees of repeated-root cyclic codes","authors":"Boran Kim","doi":"10.1007/s00200-023-00605-7","DOIUrl":"10.1007/s00200-023-00605-7","url":null,"abstract":"<div><p>There are various metrics for researching error-correcting codes. Especially, high-density data storage system gives the existence of inconsistency for the reading and writing process. The symbol-pair metric is motivated for outputs that have overlapping pairs of symbols in a certain channel. The Rosenbloom–Tsfasman (RT) metric is introduced since there exists a problem that is related to transmission over several parallel communication channels with some channels not available for the transmission. In this paper, we determine the minimum symbol-pair weight and RT weight of repeated-root cyclic codes over <span>(mathfrak R=mathbb {F}_{p^m}[u]/langle u^4rangle )</span> of length <span>(n=p^k)</span>. For the determination, we explicitly present third torsional degree for all different types of cyclic codes over <span>(mathfrak R)</span> of length <i>n</i>.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"35 4","pages":"573 - 588"},"PeriodicalIF":0.6,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42822754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computing the (forcing) strong metric dimension in strongly annihilating-ideal graphs 强湮灭理想图中强度量维数的计算
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-04-22 DOI: 10.1007/s00200-023-00601-x
M. Pazoki, R. Nikandish

The strongly annihilating-ideal graph (textrm{SAG}(R)) of a commutative unital ring R is a simple graph whose vertices are non-zero ideals of R with non-zero annihilator and there exists an edge between two distinct vertices if and only if each of them has a non-zero intersection with annihilator of the other one. In this paper, we compute twin-free clique number of (textrm{SAG}(R)) and as an application strong metric dimension of (textrm{SAG}(R)) is given. Moreover, we investigate the structures of strong resolving sets in (textrm{SAG}(R)) to find forcing strong metric dimension in (textrm{SAG}(R)).

交换一元环R的强湮灭理想图(textrm{SAG}(R))是一个简单图,它的顶点是具有非零湮灭子的R的非零理想,并且当且仅当两个不同的顶点与另一个的湮灭子有非零相交时,它们之间存在一条边。本文计算了(textrm{SAG}(R))的无双团数,并给出了(textrm{SAG}(R))的强度量维数作为应用。此外,我们研究了(textrm{SAG}(R))中的强解析集的结构,以找到(textrm{SAG}(R))中的强制强度量维。
{"title":"Computing the (forcing) strong metric dimension in strongly annihilating-ideal graphs","authors":"M. Pazoki,&nbsp;R. Nikandish","doi":"10.1007/s00200-023-00601-x","DOIUrl":"10.1007/s00200-023-00601-x","url":null,"abstract":"<div><p>The strongly annihilating-ideal graph <span>(textrm{SAG}(R))</span> of a commutative unital ring <i>R</i> is a simple graph whose vertices are non-zero ideals of <i>R</i> with non-zero annihilator and there exists an edge between two distinct vertices if and only if each of them has a non-zero intersection with annihilator of the other one. In this paper, we compute twin-free clique number of <span>(textrm{SAG}(R))</span> and as an application strong metric dimension of <span>(textrm{SAG}(R))</span> is given. Moreover, we investigate the structures of strong resolving sets in <span>(textrm{SAG}(R))</span> to find forcing strong metric dimension in <span>(textrm{SAG}(R))</span>.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 2","pages":"273 - 283"},"PeriodicalIF":0.6,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-023-00601-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42668152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using algebraic geometry to reconstruct a darboux cyclide from a calibrated camera picture 利用代数几何从校准的相机图像重建达布克斯自行车
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-03-07 DOI: 10.1007/s00200-023-00600-y
E. Hoxhaj, J. M. Menjanahary, J. Schicho

The task of recognizing an algebraic surface from a single apparent contour can be reduced to the recovering of a homogeneous equation in four variables from its discriminant. In this paper, we use the fact that Darboux cyclides have a singularity along the absolute conic in order to recognize them up to Euclidean similarity transformations.

从单个表观轮廓识别代数曲面的任务可以简化为从其判别式中恢复四变量齐次方程。在本文中,我们利用达布环沿绝对二次曲线有一个奇异点的事实来识别它们直至欧几里得相似变换。
{"title":"Using algebraic geometry to reconstruct a darboux cyclide from a calibrated camera picture","authors":"E. Hoxhaj,&nbsp;J. M. Menjanahary,&nbsp;J. Schicho","doi":"10.1007/s00200-023-00600-y","DOIUrl":"10.1007/s00200-023-00600-y","url":null,"abstract":"<div><p>The task of recognizing an algebraic surface from a single apparent contour can be reduced to the recovering of a homogeneous equation in four variables from its discriminant. In this paper, we use the fact that Darboux cyclides have a singularity along the absolute conic in order to recognize them up to Euclidean similarity transformations.\u0000</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 2","pages":"255 - 271"},"PeriodicalIF":0.6,"publicationDate":"2023-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-023-00600-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42691999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Legendre pseudorandom function as a multivariate quadratic cryptosystem: security and applications 作为多元二次型密码系统的Legendre伪随机函数:安全性与应用
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-03-01 DOI: 10.1007/s00200-023-00599-2
István András Seres, Máté Horváth, Péter Burcsi

Sequences of consecutive Legendre and Jacobi symbols as pseudorandom bit generators were proposed for cryptographic use in 1988. Major interest has been shown towards pseudorandom functions (PRF) recently, based on the Legendre and power residue symbols, due to their efficiency in the multi-party setting. The security of these PRFs is not known to be reducible to standard cryptographic assumptions. In this work, we show that key-recovery attacks against the Legendre PRF are equivalent to solving a specific family of multivariate quadratic (MQ) equation system over a finite prime field. This new perspective sheds some light on the complexity of key-recovery attacks against the Legendre PRF. We conduct algebraic cryptanalysis on the resulting MQ instance. We show that the currently known techniques and attacks fall short in solving these sparse quadratic equation systems. Furthermore, we build novel cryptographic applications of the Legendre PRF, e.g., verifiable random function and (verifiable) oblivious (programmable) PRFs.

1988年提出了用连续的勒让德和雅可比符号序列作为伪随机比特发生器用于密码学。最近,基于勒让德和幂剩余符号的伪随机函数(PRF)由于其在多方设置中的效率而引起了人们的极大兴趣。这些prf的安全性还不能简化为标准的密码学假设。在这项工作中,我们证明了针对Legendre PRF的密钥恢复攻击等效于在有限素域上求解特定的多元二次(MQ)方程组族。这个新的视角揭示了针对Legendre PRF的密钥恢复攻击的复杂性。我们对生成的MQ实例进行代数密码分析。我们表明,目前已知的技术和攻击不足以解决这些稀疏二次方程系统。此外,我们还构建了Legendre PRF的新密码学应用,例如可验证随机函数和(可验证)遗忘(可编程)PRF。
{"title":"The Legendre pseudorandom function as a multivariate quadratic cryptosystem: security and applications","authors":"István András Seres,&nbsp;Máté Horváth,&nbsp;Péter Burcsi","doi":"10.1007/s00200-023-00599-2","DOIUrl":"10.1007/s00200-023-00599-2","url":null,"abstract":"<div><p>Sequences of consecutive Legendre and Jacobi symbols as pseudorandom bit generators were proposed for cryptographic use in 1988. Major interest has been shown towards pseudorandom functions (PRF) recently, based on the Legendre and power residue symbols, due to their efficiency in the multi-party setting. The security of these PRFs is not known to be reducible to standard cryptographic assumptions. In this work, we show that key-recovery attacks against the Legendre PRF are equivalent to solving a specific family of multivariate quadratic (MQ) equation system over a finite prime field. This new perspective sheds some light on the complexity of key-recovery attacks against the Legendre PRF. We conduct algebraic cryptanalysis on the resulting MQ instance. We show that the currently known techniques and attacks fall short in solving these sparse quadratic equation systems. Furthermore, we build novel cryptographic applications of the Legendre PRF, e.g., verifiable random function and (verifiable) oblivious (programmable) PRFs.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 2","pages":"223 - 253"},"PeriodicalIF":0.6,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-023-00599-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82265861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algebraic and SAT models for SCA generation SCA生成的代数和SAT模型
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-02-21 DOI: 10.1007/s00200-023-00597-4
Marlene Koelbing, Bernhard Garn, Enrico Iurlano, Ilias S. Kotsireas, Dimitris E. Simos

In this paper, we compute sequence covering arrays (SCAs), which are arrays, consisting of sequences, such that all subsequences with pairwise different entries of some length are covered, via a novel approach based on commutative algebra and symbolic computation. Hereby, we provide various algebraic models being capable to characterize possibly small sets of permutations collectively containing particular shorter subsequences. These models take the form of multivariate polynomial systems of equations and are then processed via supercomputing by a Gröbner Basis solver in order to compute solutions from them. If the variety is not empty, i.e. the Gröbner basis is non-trivial, then each point in the computed variety can be transformed to a SCA. In our experiments, we observed varying computational performance depending on the chosen model, while all of them exhibited scalability issues. Additionally and for comparison, we give new SAT descriptions modelling SCAs. By employing a SAT solver on our provided SAT models, we are able to provide upper bounds, one of which is best among literature results. Lastly, we adapt our SAT approach to answer a question posed by Yuster (Des Codes Cryptogr 88(3):585–593, 2020). As a result, we find a characterization of the dimensions of all perfect SCAs with coverage multiplicity two of strength three.

本文通过一种基于交换代数和符号计算的新方法,计算序列覆盖数组(SCAs),它是由序列组成的数组,使得所有具有一定长度的成对不同条目的子序列都被覆盖。因此,我们提供了各种代数模型,能够表征可能小的排列集合,这些排列集合包含特定的短子序列。这些模型采用多元多项式方程组的形式,然后通过Gröbner Basis求解器的超级计算进行处理,以便从中计算出解决方案。如果变量不为空,即Gröbner基是非平凡的,则计算的变量中的每个点都可以转换为SCA。在我们的实验中,我们观察到不同的计算性能取决于所选择的模型,而它们都表现出可伸缩性问题。此外,为了进行比较,我们给出了新的模拟sca的SAT描述。通过在我们提供的SAT模型上使用SAT求解器,我们能够提供上界,其中一个是文献结果中最好的。最后,我们调整了我们的SAT方法来回答Yuster提出的问题(Des Codes Cryptogr 88(3):585 - 593,2020)。因此,我们发现了覆盖多重度为2、强度为3的所有完美sca的维度特征。
{"title":"Algebraic and SAT models for SCA generation","authors":"Marlene Koelbing,&nbsp;Bernhard Garn,&nbsp;Enrico Iurlano,&nbsp;Ilias S. Kotsireas,&nbsp;Dimitris E. Simos","doi":"10.1007/s00200-023-00597-4","DOIUrl":"10.1007/s00200-023-00597-4","url":null,"abstract":"<div><p>In this paper, we compute sequence covering arrays (SCAs), which are arrays, consisting of sequences, such that all subsequences with pairwise different entries of some length are covered, via a novel approach based on commutative algebra and symbolic computation. Hereby, we provide various algebraic models being capable to characterize possibly small sets of permutations collectively containing particular shorter subsequences. These models take the form of multivariate polynomial systems of equations and are then processed via supercomputing by a Gröbner Basis solver in order to compute solutions from them. If the variety is not empty, i.e. the Gröbner basis is non-trivial, then each point in the computed variety can be transformed to a SCA. In our experiments, we observed varying computational performance depending on the chosen model, while all of them exhibited scalability issues. Additionally and for comparison, we give new SAT descriptions modelling SCAs. By employing a SAT solver on our provided SAT models, we are able to provide upper bounds, one of which is best among literature results. Lastly, we adapt our SAT approach to answer a question posed by Yuster (Des Codes Cryptogr 88(3):585–593, 2020). As a result, we find a characterization of the dimensions of all perfect SCAs with coverage multiplicity two of strength three.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 2","pages":"173 - 222"},"PeriodicalIF":0.6,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-023-00597-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48363389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Applicable Algebra in Engineering Communication and Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1